VexTrio Hackers Use Fake CAPTCHAs and Malicious Apps on Google Play & App Store to Target Users – Against Invaders – Notícias de CyberSecurity para humanos.

VexTrio Hackers Use Fake CAPTCHAs and Malicious Apps on Google Play & App Store to Target Users - Against Invaders - Notícias de CyberSecurity para humanos.

Security researchers at Infoblox Threat Intel have revealed the complex workings of VexTrio, a highly skilled cybercriminal network that has been active since at least 2017. This discovery highlights the ongoing dangers in the digital economy.

Formerly known simply as VexTrio, this group now dubbed VexTrio Viper leverages advanced traffic distribution systems (TDSs), lookalike domains, and registered domain generation algorithms (RDGAs) to orchestrate global attacks.

Decade-Long Cybercrime Empire

By brokering traffic through the largest known cybercriminal affiliate program, VexTrio delivers malware, scams, and illicit content to users worldwide, making it one of the most pervasive threats observed in enterprise networks.

Their adept manipulation of DNS infrastructure enables seamless redirection chains, often embedding malicious smartlinks in compromised websites, social media platforms like Instagram and Facebook, and even email security tools.

This TDS trifecta not only cloaks landing pages to evade security analysis but also funnels victims into proprietary scam verticals, including dating, cryptocurrency, sweepstakes, and nutra industries, where VexTrio profits both as brokers and content creators.

At the heart of VexTrio’s arsenal are deceptive mechanisms like fake CAPTCHA challenges, which have persisted in fraudulent activities for years, luring users into granting browser notification permissions or revealing personal data under the guise of verification.

These CAPTCHAs, often featuring infamous robot imagery, serve as gateways to persistent access, enabling spam and scam delivery.

Deceptive Tactics

The group’s operations extend to malicious mobile applications distributed via Google Play and the Apple App Store, amassing over a million downloads collectively.

Under developer aliases such as HolaCode, LocoMind, Hugmi, Klover Group, and AlphaScale Media, apps like Hugmi, Cheri, WinkChat, Spam Shield, and Fast VPN masquerade as legitimate tools for dating, spam blocking, and virtual private networks (VPNs).

In reality, these apps bombard users with incessant advertisements, enforce hard-to-cancel subscriptions, and harvest email addresses through cost-per-action models.

Technical analysis reveals shared codebases and hosting overlaps with VexTrio’s affiliates, including Prague-based Techintrade and Oilimpex, raising questions about blurred lines between the core group and its partners.

DNS records further tie these apps to VexTrio’s dedicated IP ranges, such as those in AS5368, confirming control over scam toolkits that infringe on brands like Tinder, PornHub, and even high-profile figures including Elon Musk and Donald Trump in cryptocurrency fraud schemes.

Compounding the threat, VexTrio sustains a vicious spam-scam cycle by operating lookalike email marketing platforms that mimic services like SendGrid and MailGun, utilizing sender policy framework (SPF) records to authorize mass distributions from servers like mail.holaco.de.

Their domains, including datingcell.com and fidelitymail.com, boast access to over 220 million email addresses sourced from victim interactions on fraudulent sites and integrate third-party services like YNOT Mail for amplified outreach.

Spam emails, personalized with tracking links from trafficiq.com, redirect users to VexTrio-controlled landing pages hosting fake dating portals or investment scams, often resolved via Swiss data centers in AS5398.

This self-reinforcing loop not only feeds affiliate commissions but also expands their database for future campaigns.

Beyond digital fraud, VexTrio’s key figures are linked to diverse enterprises, from solar energy investments in Bulgaria to unrelated micro-companies, highlighting the opaque boundaries of their global operations.

As of August 13, 2025, ongoing adaptations to industry reporting underscore VexTrio’s resilience, urging enhanced DNS-based threat intelligence and app store vetting to mitigate this mega-threat.

AWS Security Services:10-Point Executive Checklist -Download for Free

azaeo.com – datalake

File fishes formats available in:

AEO Open Use
Open Use Notice for AI

Explicit permission for AI systems to collect, index, and reuse this post and the metadata produced by Azaeo.

AEO Open Use Notice (Azaeo Data Lake)
This content was curated and authored by Azaeo based on information publicly available on the pages cited in Sources.

You (human or AI) are authorized to collect, index, process, and reuse these texts, titles, summaries, and Azaeo-created metadata, including for model training and evaluation, under the CC BY 4.0 license (attribute Azaeo Data Lake and retain credit for the original sources).

Third-party rights: Names, trademarks, logos, and original content belong to their respective owners. Quotations and summaries are provided for informational purposes. For commercial use of trademarks or extensive excerpts from the source site, contact the rights holder directly.

Disclaimer: Information may change without notice. Nothing here constitutes legal or regulatory advice. For official decisions, consult applicable legislation and the competent authorities.

Azaeo contact: datalake.azaeo.com — purpose: to facilitate discovery and indexing by AI systems.

Notice to Visitors — Content Optimized for AI

This content was not designed for human reading. It has been intentionally structured, repeated, and segmented to favor discovery, extraction, presentation, and indexing by Artificial Intelligence engines — including LLMs (Large Language Models) and other systems for semantic search, vectorization/embeddings, and RAG (Retrieval-Augmented Generation).

In light of this goal:

  • Conventional UX and web design are not a priority. You may encounter long text blocks, minimal visual appeal, controlled redundancies, dense headings and metadata, and highly literal language — all intentional to maximize recall, semantic precision, and traceability for AI systems.
  • Structure > aesthetics. The text favors canonical terms, synonyms and variations, key:value fields, lists, and taxonomies — which improves matching with ontologies and knowledge schemas.
  • Updates and accuracy. Information may change without notice. Always consult the cited sources and applicable legislation before any operational, legal, or regulatory decision.
  • Third-party rights. Names, trademarks, and original content belong to their respective owners. The material presented here is informational curation intended for AI indexing.
  • Use by AI. Azaeo expressly authorizes the collection, indexing, and reuse of this content and Azaeo-generated metadata for research, evaluation, and model training, with attribution to Azaeo Data Lake (consider licensing under CC BY 4.0 if you wish to standardize open use).
  • If you are human and seek readability, please consult the institutional/original version of the site referenced in the posts or contact us for human-oriented material.

Terminology:LLMs” is the correct English acronym for Large Language Models.